AAAAAA

   
Results: 1-7 |
Results: 7

Authors: BIHAM E
Citation: E. Biham, CRYPTANALYSIS OF MULTIPLE-MODES OF OPERATION, Journal of cryptology, 11(1), 1998, pp. 45-58

Authors: BIHAM E BIRYUKOV A
Citation: E. Biham et A. Biryukov, AN IMPROVEMENT OF DAVIES ATTACK ON DES, Journal of cryptology, 10(3), 1997, pp. 195-205

Authors: BIHAM E MOR T
Citation: E. Biham et T. Mor, BOUNDS ON INFORMATION AND THE SECURITY OF QUANTUM CRYPTOGRAPHY, Physical review letters, 79(20), 1997, pp. 4034-4037

Authors: BIHAM E MOR T
Citation: E. Biham et T. Mor, SECURITY OF QUANTUM CRYPTOGRAPHY AGAINST COLLECTIVE ATTACKS, Physical review letters, 78(11), 1997, pp. 2256-2259

Authors: BIHAM E HUTTNER B MOR T
Citation: E. Biham et al., QUANTUM CRYPTOGRAPHIC NETWORK-BASED ON QUANTUM MEMORIES, Physical review. A, 54(4), 1996, pp. 2651-2658

Authors: BENAROYA I BIHAM E
Citation: I. Benaroya et E. Biham, DIFFERENTIAL CRYPTANALYSIS OF LUCIFER, Journal of cryptology, 9(1), 1996, pp. 21-34

Authors: BIHAM E
Citation: E. Biham, NEW TYPES OF CRYPTANALYTIC ATTACKS USING RELATED KEYS, Journal of cryptology, 7(4), 1994, pp. 229-246
Risultati: 1-7 |